Results 1 to 10 of about 516,882 (198)

A Fuel‐Driven Lock‐and‐Key System

open access: goldChemistryOpen
This study introduces a fuel‐driven lock‐and‐key system based on the interaction between crown ether and ammonium ion. In this simple model system, a key‐like molecule with an amino group functions as the key, while 15‐crown‐5 serves as the lock.
Shilin Zhang   +4 more
doaj   +2 more sources

Molecular Docking: From Lock and Key to Combination Lock

open access: diamondJournal of Molecular Medicine and Clinical Applications, 2018
Accurate modeling of protein ligand binding is an important step in structure-based drug design, is a useful starting point for finding new lead compounds or drug candidates. The 'Lock and Key' concept of protein-ligand binding has dominated descriptions of these interactions, and has been effectively translated to computational molecular docking ...
Ashutosh Tripathi, Vytas A. Bankaitis
openalex   +3 more sources

A DNA dual lock-and-key strategy for cell-subtype-specific siRNA delivery

open access: yesNature Communications, 2016
Delivery of siRNA to target cells is essential for in vivogene therapy. Here the authors demonstrate an oligonucleotide aptamer that targets therapeutic siRNA to a specific cell type.
Ying Liu, Yue Zhang, Min Yang
exaly   +2 more sources

Censorship: the Key to Lock-In? [PDF]

open access: yes, 2005
Markets for information and entertainment are frequently characterized by increasing returns to scale in production and distribution. This implies that incumbent technologies enjoy an advantage over newcomer technologies; such markets can become locked ...
Brendan M. Cunningham
core   +1 more source

Implementation of Suitcase Lock Security System Using Near Field Communication (NFC) and Global Positioning System (GPS)

open access: yesJurnal Jaringan Telekomunikasi, 2023
A key is a tool made of metal to open or fasten a door or object that has a lock by inserting it into the hole in the main key. The lock itself is usually used on doors, suitcases, or other objects that require security.
Hudiono Hudiono   +2 more
doaj   +1 more source

A Secure Scan Architecture Protecting Scan Test and Scan Dump Using Skew-Based Lock and Key

open access: yesIEEE Access, 2021
Scan-based Design for Testability (DFT) is widely used in industry as it consistently provides high fault coverage. However, scan-based DFT is prone to security vulnerabilities where attackers use the scan design to obtain secret information from the ...
Hyungil Woo, Seokjun Jang, Sungho Kang
doaj   +1 more source

Acoustically levitated lock and key grains

open access: yesPhysical Review Research, 2023
We present a scheme for generating shape-dependent, specific bonds between millimeter scale particles, using acoustic levitation. We levitate particles in an ultrasonic standing wave, allowing for substrate-free assembly.
Melody X. Lim, Heinrich M. Jaeger
doaj   +1 more source

Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets

open access: yesIEEE Access, 2022
The twenty first century has witnessed an enormous rise in data produced per person and it has also witnessed newer and advanced forms of digital attacks and instinctively, witnessed a rise in the need for data protection.
Sibi Chakkaravarthy Sethuraman   +5 more
doaj   +1 more source

Lock and Key: Why Rickettsia Endosymbionts Do Not Harm Vertebrate Hosts?

open access: yesPathogens, 2022
Are tick endosymbionts transmitted to and able to injure vertebrate hosts [...]
Alejandro Cabezas-Cruz   +1 more
doaj   +1 more source

Analytical and Experimental Investigation into Pre-Stressed Carbon Fiber Reinforced Polymer (CFRP) Fatigue Retrofits for Steel Waterway Lock-Gate Structures

open access: yesMetals, 2022
Lock gates are an important part of the transportation infrastructure within the United States (US). Unfortunately, many existing lock gates have reached or exceeded their initial design lives and require frequent repairs to remain in service ...
Christine Lozano   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy